Tytuł artykułu
Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Detection of unpredictable incidents in the internet activity with the use of entropy
Języki publikacji
Abstrakty
Niniejsze opracowanie zostało wykonane w ramach projektu PBS 1/A3/14/2012. W załączonym materiale zdefiniowano i zbadano różne odmiany entropii, począwszy od Clausiusa, przez Shannona i Tsallisa, do T-entropii Kołmogorowa-Titchenera-Eimanna. Badania prowadzono pod kątem kontroli ruchu internetowego w szybkich sieciach internetowych. Szczegółowo rozpatrzono system TES (Tsallis Entropy Spectrum) funkcjonujący w akademickiej sieci Szwajcarii.
The present study has been done as a part of the project PBS 1/A3/14/2012. In the presented material, different forms of entropy have been studied and defined, beginning with Clausius, Shannon and Tsallis, then T-entropy of KolmogorowTitchener-Eimann. The studies have been done to control internet activity in the speedy internet nets. The system TES (Tsallis Entropy Spectrum) in the academic net in Switzerland has been taken under special investigation.
Rocznik
Tom
Strony
87--107
Opis fizyczny
Bibliogr. 21 poz., rys., tab., wykr.
Twórcy
autor
- Europejska Wyższa Szkoła Informatyczno-Ekonomiczna w Warszawie, ul. Białostocka 22, 03-741 Warszawa
Bibliografia
- [1] Brauckhoff D. et al., Applying PCA for Traffic Anomaly Detection, INFOCOM, 2009.
- [2] Burkhart M. et al., The Role of Network Trace Anonymization under Attack, SIGCOMM CCR 40, January 2010, s. 5-11.
- [3] Clark G., Teutsch J., Maximizing T-complexity, US Department of Defense, Elsevier, 2012.
- [4] Clausius R., Über die bewegende Kraft der Wärme, “Annalen der Physik“ 79, 1850.
- [5] Eimann R., Network Event Detection with Entropy Measures, Dissertation Thesis, University of Auckland 2008.
- [6] Fontugne R. et al., Combining Diverse Anomaly Detectors, Proc. ACM Conference, New York 2010.
- [7] Kozaitis S. et al., Improved Anomaly Detection using Block-Matching Denoising, “Computer Communications” 35(7), 2012.
- [8] Lee D. C. et al., Fast Traffic Anomalies Detection using SNMP MIB Correlation Analysis, Advanced Communications Technology, Piscataway, USA 2009.
- [9] Leśniewicz M., Sprzętowa generacja losowych ciągów binarnych, WAT 2009.
- [10] Paredes-Oliva I. et al., Practical Anomaly Detection based on Classifying Frequent Traffic Patterns, IEEE Global Internet Symposium, 2012.
- [11] Pawelec J., Radiokomunikacja, UTH, Radom 2002.
- [12] Shannon C., The Mathematical Theory of Communication, “The Bell System Technical Journal” 30, 1951, pp. 50-64.
- [13] Sharma A. et al., Tanimoto Based Similarity Measure for Intrusion Detection System, “Journal of Information Security” 2(4), 2011.
- [14] Speidel U. et al., Detecting Network Events via T-entropy, Int. Conf. on Information, Communications and Signal Processing, Singapore 2007.
- [15] Tavallaee M. et al., Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods, “Transaction on Systems, Man, and Cybernetics” 40(5), September 2010.
- [16] Tellenbach B. et al., Accurate Network Anomaly Classification with Generalized Entropy Metrics, “Computer Networks” 55 (15), 2011.
- [17] Tellenbach B., Detection, Classification and Visualization of Anomalies using Generalized Entropy Metrics, Elektro-Technische Hochschule, Zurich 2012.
- [18] Trammell B. et al., Peeling Away Timing Error in NetFlow Data, PAM – Passive and Active Measurement Conference, Springer 2011.
- [19] Tsallis C., Introduction to Nonextensive Statistical Mechanics, Springer 2009.
- [20] Tsallis C., Possible Generalization of Boltzmann-Gibbs Statistics, “J. Statistical Physics” 52, No. 1-2, 1988, pp. 479-489.
- [21] Zhang Y. et al., A Novel Approach to Scan Detection on the Backbone, Informatics Technology: New Generation, April 2009.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-9f1ee713-bff8-4fd6-8648-ef38050ea25e